XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Tech: A/B Testing

Know Your Tech: A/B Testing

A key component to effectively attracting your audience is to better understand their preferences. Even the most seemingly insignificant change, like changing the color of the buttons on your website, can have a major impact on how effective your materials are. Fortunately, through a process called A/B testing, observing the impact of these changes is somewhat straightforward.

A/B Testing, Defined
Running an A/B test is the process of comparing a single variable to deem which option, Option A or Option B, is the more effective of the two. The key to an effective A/B test is to only change one thing between the two test subjects - otherwise, you have no way of knowing exactly what it was that was the influential change.

A/B tests can be used to make a wide variety of choices, from something as simple as an adjustment to a call-to-action to a different layout to a particular page. In this case, Option A should be the way things currently are to serve as a control for the experiment, while Option B displays your proposed change. Each option is then presented to an equally-sized segment of your audience to deem which of the two is the more effective.

Setting Up an A/B Test
A/B testing can be used to make a vast number of decisions, as long as they are approached one at a time. As we said before, if multiple variables are involved in a single test, that test isn’t going to deliver reliable enough results to make any well-supported decisions. It is also worth mentioning that A/B testing tends to work better when comparing options for relatively minor changes, like calls-to-action or images included in an email or on a landing page, rather than big ones.

The first step will be to decide which variable you intend to test, followed by your determination of a metric to base your observations against. Does this change boost engagement? Increase the time spent on page? Improve your click-through rate?

Once this has been accomplished, you’re ready to state what your control option will be, and what your change will be after that. Your control group should be whatever you currently have in place, so you can accurately judge if a change would be an improvement or not. Then you need to settle on a sample size, or the number of recipients that will be a part of this test.

Not all changes will be accurately measured with a sample size alone. Some changes would be better left running until a statistically significant data sample has been collected. Speaking of statistical significance, you will also need to decide how significant your results have to be before a change is deemed to be worthwhile.

Running An A/B Test
There are two real keys to running a successful A/B test: first, you have to give it enough time to collect the data you’ll need to come to a conclusion, and second, both options need to be tested at the same time to prevent other variables from affecting your data. Of course, if the variable that your A/B test is evaluating is timing, this doesn’t apply so much.

In short, A/B testing is a relatively simple way to make sure that you’re having as large an impact on your audience as possible. Can you think of any times that you’ve done something similar to test out a proposed change? Tell us about it in the comments!

Hackers Target Major Sporting Events
Hackers Plus Artificial Intelligence Equals Big Tr...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, January 17 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Hackers Data Small Business Google Hardware Mobile Devices Productivity VoIP Mobile Office Malware Email Gadgets Quick Tips Network Security Efficiency Network IT Support Innovation IT Services Social Media Business Management Business Business Continuity Smartphones Server Miscellaneous Upgrade Communication Virtualization User Tips Windows Disaster Recovery Communications Data Backup Computer Microsoft Office Managed IT Services Users Smartphone Mobile Device Management Browser Data Recovery Passwords Holiday Android WiFi Save Money Marketing Ransomware Outsourced IT Tech Term Alert BDR Mobile Computing Cybercrime Vendor Management Internet of Things Chrome Operating System Cloud Computing Remote Monitoring Windows 10 Router Artificial Intelligence Information Technology Computers Avoiding Downtime Automation Bring Your Own Device Apple BYOD Going Green The Internet of Things History Best Practice Managed IT Services Telephone Systems Cybersecurity VPN Firewall Spam Big Data Remote Computing Current Events IT Solutions Trending Application Collaboration Hacking Printer Facebook Social Engineering Phone System Wireless Technology Employer-Employee Relationship IT Consultant Health Excel App Bandwidth Money Proactive IT Productivity Lithium-ion Battery Office Windows 10 Budget Mobility IT Support Maintenance Windows 8 Recovery Unified Threat Management How To iPhone Office 365 Networking Applications Mouse Business Intelligence Business Managament Content Filtering Phishing Two-factor Authentication Fax Server Mobile Device Apps Data Protection Blockchain Managed IT Word PowerPoint Value Data Security Sports Private Cloud Redundancy User Error Website Customer Relationship Management Law Enforcement Humor Hard Drives Training Gmail Encryption Outlook Access Control Antivirus Tutorials Virus Settings Analytics Information Google Drive Analysis Social Networking File Sharing Memory Digital Payment Hacker Computer Repair Vulnerability Network Congestion Conferencing Managed Service Tech Support Wi-Fi Scam Connectivity Tablet Administrator Identity Theft Search Save Time Twitter Voice over Internet Protocol Office Tips Data Management Document Management Streaming Media Risk Management Compliance IT Management Social Flexibility Servers Inbound Marketing Entertainment Saving Time Retail Software as a Service Administration Machine Learning Human Resources Downtime OneNote Data storage IT service Update Best Available Video Surveillance Display Data Storage eWaste Bluetooth Paperless Office Internet Exlporer Comparison People Keyboard Telephony PDF IBM Google Docs Safety Samsung Work/Life Balance Data Breach Windows 7 Piracy HaaS End of Support Robot Government USB Botnet Leadership YouTube Online Currency Virtual Assistant Meetings Workers Point of Sale Computer Accessories Recycling Credit Cards DDoS Education Data loss Telephone System Statistics Solid State Drive Black Market CES Skype Fraud Programming Spam Blocking Smart Tech Instant Messaging IT Plan Wireless Physical Security Cleaning Password Environment Running Cable Webinar Touchscreen Public Cloud Augmented Reality Intranet Content Management SaaS Wearable Technology Help Desk Biometrics Unsupported Software Infrastructure Safe Mode Virtual Reality HIPAA Storage WIndows 7 Sync Cables Hybrid Cloud Windows 8.1 Update Hiring/Firing Touchpad Nanotechnology Remote Worker Printer Server Shortcut Windows Server 2008 Amazon Web Services IaaS Computing Infrastructure HVAC Security Cameras Computer Care Practices Worker Commute Software Tips Remote Work Relocation Debate Hosted Solution Search Engine User Password Manager Legal Accountants Business Technology Bloatware Webcam Monitor Addiction Virtual Private Network Managing Stress Domains Unified Communications Enterprise Content Management Science Staff Wiring Online Shopping Audit Hosted Computing Proactive Netflix Macro Students Bing Business Mangement Root Cause Analysis Entrepreneur Data Warehousing Specifications Reputation Co-managed IT Cache Project Management Start Menu PC Care Theft Password Management Tablets Scheduling Digital Signature Supercomputer Devices GDPR Regulations 3D Evernote Internet exploMicrosoft Computer Fan NarrowBand Inventory Remote Monitoring and Maintenance Windows Media Player Virtual Desktop HBO eBay IT Security Healthcare Hiring/Firing Shortcuts Travel Criminal IoT Cost Management Millennials Customers Print Server Wireless Internet Warranty Mobile Cortana Alerts Uninterrupted Power Supply NIST Upgrades Analyitcs Multi-Factor Security Strategy nternet Crowdfunding Knowledge Thought Leadership E-Commerce Wireless Charging Advertising Remote Support FENG Chromecast Line of Business Customer Service Frequently Asked Questions Text Messaging Distributed Denial of Service Files Patch Management Electronic Health Records eCommerce Company Culture Screen Mirroring Gaming Console Workforce Law Firm IT 360 Emails Wire Microchip Consultant Professional Services Google Apps Work Station Cryptocurrency Lifestyle Content Filter Camera Flash Fiber-Optic Notifications Electronic Medical Records Laptop LinkedIn Business Owner Authentication MSP Cameras Tip of the week Amazon Colocation Windows 10s Vendor Net Neutrality Charger Cast Insurance Telecommuting SharePoint Smart Office Licensing Tools Shadow IT Printers Thank You Automobile Public Computer Benefits IT solutions Congratulations Employer Employee Relationship CrashOverride Employee/Employer Relationship Smart Technology Loyalty Books Experience Battery Content Two Factor Authentication Video Games Smartwatch Emergency Worker Music Audiobook Scalability Assessment Rootkit Regulation Politics How to Television Transportation Troubleshooting Webinar Utility Computing Techology

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *